home *** CD-ROM | disk | FTP | other *** search
- TO MOVE THROUGH THE FOLLOWING DOCUMENT, use the up and down arrow keys,
- the PyUp and PgDn keys, the Home key or the End key. Press Esc to
- exit at any time.
-
- Now that you have successfully installed WATCHDOG, you have a basic
- security system that you can build from. Review the following
- suggestions before logging on to the system:
-
- 1. To provide the desired level of security and auditing, change the
- SYSTEM PROFILE and System Permission defaults established during
- installation. Pay special attention to "Restrict Access to DOS
- Startup Files" and "Require User to Change Password".
-
- 2. Add other User IDs and Passwords in the USER PROFILE for those
- persons who will be permitted to use the PC.
-
- 3. Add DOS directories that require additional protection beyond access
- control to the AREA PROFILE. After defining a directory as a
- protected area, you need to grant access to the users who need it.
-
- 4. Specify utilities that need extended access to the hard disk (e.g.,
- CHKDSK, TREE, and the BACKUP/RESTORE utility you use) in the UTILITY
- PROFILE. You can also specify who can edit CONFIG.SYS and AUTOEXEC.
- BAT in the UTILITY PROFILE.
-
- 5. With the Control Diskette Booting feature, you can restrict users
- from booting from drive A and accessing the hard disk. Before turning
- on Control Diskette Booting, make certain that no errors exist which
- might prevent the PC from booting from the hard disk.
-
- This help facility, known as WDVIEW, is displayed every time you log on.
- If you want to delete it, run the System Administration Program and
- select F2 SYSTEM PROFILE. Then select F5 Change System Configuration
- and delete WDVIEW from the Logon Exec field. WDVIEW may be run at any
- time by entering the command WDVIEW from the DOS prompt.
-
- Press Esc to exit WDVIEW and complete logging on.
-